25 Critical Vulnerabilities in NETGEAR Routers, Update Now

The manufacturer NETGEAR has to re-update almost all its home routers and WiFi Mesh systems, this is because a large number of critical vulnerabilities have been found in its firmware . These vulnerabilities have been classified as critical by the Incibe, therefore, if you have a router or WiFi Mesh system from the manufacturer NETGEAR, pay close attention to update to the latest firmware version as soon as possible to avoid security problems.

What security flaws have been found?

25 Critical Vulnerabilities in NETGEAR Routers

The security flaws found in NETGEAR WiFi Mesh and routers are rated critical, scoring more than 9 out of 10, indicating the severity of these discovered vulnerabilities.

The first vulnerability discovered in a large number of models is the possibility of injecting commands before authentication in some WiFi Mesh systems from the manufacturer, that is, in NETGEAR Orbi, arbitrary commands could be injected before authenticating, which indicates the severity of this ruling. It has also been discovered that there is an authentication bypass in some routers and WiFi Mesh systems, so in this case it will not even ask for authentication on the manufacturer’s equipment. The NETGEAR XR1000 model is one of the manufacturer’s top-of-the-range gaming routers, this model suffers from two very serious security flaws:

  • Command injection
  • Disclosure of sensitive information

Finally, it has also been discovered that the keys have been saved in clear text in some models of WiFi Mesh systems, that is, they have keys saved by default, which leads to a serious security breach that should never occur.

Netgear R7000P

Routers and WiFi Mesh Affected

NETGEAR has suffered these vulnerabilities on a large number of high-end routers, both with WiFi 5 and WiFi 6. Vulnerable NETGEAR neutral routers are as follows:

  • R7000P
  • R8000
  • RAX15
  • RAX20
  • RAX200
  • RAX35v2
  • RAX43
  • RAX45
  • RAX50
  • RAX75
  • RAX80
  • XR1000

Regarding the WiFi Mesh systems affected, below you can see the complete list:

  • RBK20
  • RBK50
  • RBK752
  • RBK852
  • RBR20
  • RBR40
  • RBR50
  • RBR750
  • RBR850
  • RBR852
  • RBS20
  • RBS40
  • RBS40V
  • RBS50
  • RBS50Y
  • RBS750
  • RBS850
  • RBW30
  • MK62
  • MR60
  • MS80

Mesh WiFi systems with DOCSIS cable entry are also affected, the models are the CBR40 and the CBR750, in addition, the ADSL D7000v2 router is also affected, as well as the 4G LTE LAX20 router, therefore, a large number of NETGEAR equipment are affected.

Where can I download the new firmware?

Most NETGEAR routers and WiFi Mesh have the ability to download the firmware directly to the device from the Internet, thanks to this, we will not have to download the firmware manually and later update our equipment. However, it is highly recommended to verify that the latest version that appears on the router is the latest version that we have officially on the manufacturer’s website.

On the official NETGEAR support website you have to indicate the model of your device, be it a router or WiFi Mesh system, and you will automatically see which are the latest firmware versions, you will have to download the firmware and then upload it via the web in the «section Upgrade firmware »to update the firmware of the router , once done, you will not lose any configuration made, although if you have not done a firmware update for a long time, our recommendation is to do a factory reset so as not to have any type of trouble.

We recommend that you update your router as soon as possible to avoid possible security problems in your network. In recent times, the manufacturer NETGEAR has sent security notices in a large number of models, although it updates them quite regularly, it is worrying that they have to fix so many security flaws in all their models, with other manufacturers this does not happen in a way so disturbing.